Impact
The vulnerability stems from improper handling of insufficient permissions in the Windows Error Reporting service. This flaw permits an authorized local user to gain higher privileges on the system, enabling them to execute actions normally reserved for administrators. The weakness aligns with CWE‑280, Elevation of Privilege. The impact is a local privilege escalation that could lead to full system compromise if exploited by an attacker with basic user access.
Affected Systems
The flaw affects Microsoft Windows operating systems including Windows 10 versions 21H2 and 22H2, Windows 11 versions 23H2, 24H2, 25H2, and 22H3, as well as Windows Server 2022, its 23H2 Server Core edition, and Windows Server 2025 and its Server Core edition. All listed editions specify x86, x64, or arm64 architectures as relevant.
Risk and Exploitability
The CVSS base score of 7.8 indicates high severity, while the EPSS score of less than 1% suggests a low yet non‑zero probability of exploitation. The flaw is not present in CISA’s KEV catalog. Because the description specifies an “authorized attacker,” the likely attack vector is a local user with some existing privileges. Once the flaw is abused, the attacker can elevate to administrative rights, potentially facilitating further attacks such as persistence, data exfiltration, or installation of malicious software.
OpenCVE Enrichment